Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for managing account information

a technology for managing account information and accounts, applied in the field of consumers' account information management, can solve problems such as identity theft, identity theft risk, and consumer questioning whether

Active Publication Date: 2006-09-14
DEBIX ONE
View PDF11 Cites 174 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

"The present invention is a method and system for verifying a consumer's identity and granting access to their accounts. It involves a trusted third party confirming the consumer's identity and designating which accounts they can protect. When an account provider needs access to these accounts, they notify the trusted third party and the trusted third party contacts the consumer through their communication device and requests their PIN. The consumer's PIN is the only factor needed for granting access to their account, so if the party accessing the account does not have the consumer's communication device or PIN, the request will not be approved. This method ensures secure access to the consumer's accounts and prevents unauthorized access."

Problems solved by technology

By stealing a user's personal identification and financial account information, identity thieves breach trusted security mechanisms that are routinely relied upon by consumers, banks, merchants, healthcare providers, and the government.
Even the threat of identity theft can create tension between these parties.
For example, the risk of identity theft forces consumers to question whether any communication, be it a letter, an email, a website or a phone call, actually originated from the consumer's financial institution.
Similarly, the threat of identity theft causes the Consumer's financial institution to take added measures to ensure that the party using a credit card or signing checks is actually the owner of the credit card or the checking account.
Single-factor authentication lacks security because it is so easy for a third party to steal or guess the password.
Any purely information-based approach to authentication is vulnerable to increasingly sophisticated identity theft and fraud attacks.
In addition, new guidance from the Federal Financial Institutions Examination Council (FFIEC) impacts how financial institutions handle sensitive transactions.
This approach results in great cost to the organization and an unacceptable burden on the consumer.
Even in cases where the hardened authentication systems utilize a scheme that a financial institution may deem secure at an acceptable cost, those systems don't address the consumer's need for convenience, nor the need to maintain privacy and integrity of the consumer's personal data.
However, the issue of consumer adoption is more complicated.
Consumers may be willing or able to carry a device to record and track identifying information and / or account information required by one financial institution, but are typically unwilling to carry multiple devices, one for each of the financial institutions, banks, merchants, healthcare providers, and governmental entities with whom they transact business.
Such a multi-factor, multi-band system would present a significant technical obstacle for the fraudster to overcome.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for managing account information
  • Method and system for managing account information
  • Method and system for managing account information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention is an improved method and system for managing a consumer's account information. The invention may be used in connection with transactions between consumers on the one hand and financial institutions, banks, merchants, healthcare providers, governmental entities or any other party engaged in transactions with consumers in which identifying information is exchanged. Accordingly, the words “financial institution,”“bank,”“merchant,”“healthcare provider,” and “governmental entity” are used interchangeably herein. Similarly, the words “organization,”“enterprise,”“corporation,”“company,”“venture” and “operation” are used interchangeably herein and can be used to describe private organizations or governmental entities and are not meant to be limiting.

[0025] A “user,”“consumer” or “subscriber” may be a human user or may be a software process that is configured to access an electronic account.

[0026] An “account provider” can be an organization that provides its ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and system for authenticating the identity of a consumer is disclosed. After the consumer is authenticated by a trusted third party, the consumer designates accounts that the consumer wishes to “lock.” When a party requests access to that account, the consumer is notified through the consumer's phone and asked to input a PIN. If the consumer provides the PIN, the requestor is granted access to the consumer's account without requiring further input from the consumer. If the party authorizing the transaction in this “two-factor” authentication does not possess both the phone and the consumer's PIN, or that party elects not to provide the PIN, the request will not be authenticated.

Description

CROSS REFERENCE TO RELATED APPLICATION [0001] This non-provisional application claims priority based upon prior U.S. Provisional Patent Application Ser. No. 60 / 660,286 filed Mar. 10, 2005 in the name of James Richard Holland, IV, entitled “Identity Firewall,” the disclosure of which is incorporated herein by reference.FIELD [0002] The method and system of the present invention pertains to the management of a consumer's account information, and more specifically to a system and method for automating the registration, management and controlled disclosure of certain electronic personal identification and financial account data. BACKGROUND [0003] By stealing a user's personal identification and financial account information, identity thieves breach trusted security mechanisms that are routinely relied upon by consumers, banks, merchants, healthcare providers, and the government. This identity fraud creates two victims: the consumer and the organization that manages the consumer's accoun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06K9/00G06Q20/00
CPCG06Q20/02G06Q20/227G06Q20/40G06Q20/4014G06Q20/42G06Q20/425G06Q40/04G07C9/00039G07C9/00087G07C9/23G07C9/257
Inventor HOLLAND, JAMES RICHARD IV
Owner DEBIX ONE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products